BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

124 related articles for article (PubMed ID: 38297629)

  • 1. Optical cryptosystem based on computational ghost imaging and nonlinear authentication.
    Zhang L; Wang X; Zhou Q; Xue J; Xu B
    Opt Express; 2024 Jan; 32(3):4242-4253. PubMed ID: 38297629
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Steganographic optical image encryption based on single-pixel imaging and an untrained neural network.
    Lin S; Wang X; Zhu A; Xue J; Xu B
    Opt Express; 2022 Sep; 30(20):36144-36154. PubMed ID: 36258550
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Secret sharing scheme based on spread spectrum ghost imaging.
    Liu J; Wang L; Zhao S
    Appl Opt; 2022 Aug; 61(24):7102-7107. PubMed ID: 36256327
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Experimental demonstration of ghost-imaging-based authentication in scattering media.
    Xiao Y; Zhou L; Chen W
    Opt Express; 2019 Jul; 27(15):20558-20566. PubMed ID: 31510147
    [TBL] [Abstract][Full Text] [Related]  

  • 5. An optical multiple-image authentication based on computational ghost imaging and total-variation minimization.
    Zhou Y; Sun Y; Yang M; Hou J; Xiao Z; Anand A; Sui L
    Heliyon; 2023 Jul; 9(7):e17682. PubMed ID: 37449136
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Optical image encryption based on biometric keys and singular value decomposition.
    Tao S; Tang C; Shen Y; Lei Z
    Appl Opt; 2020 Mar; 59(8):2422-2430. PubMed ID: 32225778
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Speckle-Based Optical Cryptosystem and its Application for Human Face Recognition via Deep Learning.
    Zhao Q; Li H; Yu Z; Woo CM; Zhong T; Cheng S; Zheng Y; Liu H; Tian J; Lai P
    Adv Sci (Weinh); 2022 Sep; 9(25):e2202407. PubMed ID: 35748190
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Optical multiple-image authentication based on computational ghost imaging and hybrid non-convex second-order total variation.
    Zhou Y; Sun Y; Yang M; Zhou B; Hou J; Zeng T; Xiao Z; Sui L
    Opt Express; 2023 Jun; 31(13):20887-20904. PubMed ID: 37381202
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Information encryption based on the customized data container under the framework of computational ghost imaging.
    Liansheng S; Cong D; Minjie X; Ailing T; Anand A
    Opt Express; 2019 Jun; 27(12):16493-16506. PubMed ID: 31252874
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Computational ghost imaging with spatiotemporal encoding pseudo-random binary patterns.
    Ye Z; Liu HC; Xiong J
    Opt Express; 2020 Oct; 28(21):31163-31179. PubMed ID: 33115096
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Optical multiple-image authentication method based on Fourier single-pixel imaging and multiple logistic maps.
    Tianyu Z; Liansheng S; Zhaolin X; Yaoling Z
    Opt Express; 2023 Jul; 31(16):26535-26551. PubMed ID: 37710512
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Optical authentication method based on correspondence ghost imaging.
    Zhang J; Zhao D; Li Y; Liu Y; Sun M; Li X; Yu Z; Zhou X
    Appl Opt; 2023 Oct; 62(29):7678-7688. PubMed ID: 37855475
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Forgery attack on optical encryption based on computational ghost imaging.
    Yuan S; Wang L; Liu X; Zhou X
    Opt Lett; 2020 Jul; 45(14):3917-3920. PubMed ID: 32667318
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform.
    Perez RA; Vilardy JM; Pérez-Cabré E; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772719
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Optical information authentication using phase-only patterns with single-pixel optical detection.
    Xiao Y; Zhou L; Chen W
    Appl Opt; 2021 Apr; 60(10):B1-B7. PubMed ID: 33798130
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Optical image hiding under framework of computational ghost imaging based on an expansion strategy.
    Liansheng S; Jiahao W; Ailing T; Asundi A
    Opt Express; 2019 Mar; 27(5):7213-7225. PubMed ID: 30876289
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Cryptoanalysis and enhancement of a binary image encryption system based on interference.
    Du J; Xiong Y; Quan C
    Appl Opt; 2021 Sep; 60(26):8038-8045. PubMed ID: 34613065
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain.
    Perez RA; Pérez-Cabré E; Vilardy JM; Millán MS; Torres CO
    Sensors (Basel); 2023 Feb; 23(3):. PubMed ID: 36772681
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Asymmetric cryptosystem using random binary phase modulation based on mixture retrieval type of Yang-Gu algorithm.
    Liu W; Liu Z; Liu S
    Opt Lett; 2013 May; 38(10):1651-3. PubMed ID: 23938899
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes.
    Wang X; Chen W; Chen X
    Opt Express; 2015 Mar; 23(5):6239-53. PubMed ID: 25836845
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.